Byzantine preferential voting
… In this section we discuss preference profiles that are vulnerable to Byzantine nodes. The
first case is based on reducing the rankings to binary agreement and gives the highest …
first case is based on reducing the rankings to binary agreement and gives the highest …
Voting in the presence of byzantine faults
L Tseng - 2017 IEEE 22nd Pacific Rim International …, 2017 - ieeexplore.ieee.org
… centralized voting mechanism is not feasible. Thus, we study the Byzantine voting problem
… that it is possible to design Byzantine voting algorithms that produce the voting output in one …
… that it is possible to design Byzantine voting algorithms that produce the voting output in one …
Byzantine spectral ranking
A Datar, A Rajkumar… - Advances in Neural …, 2022 - proceedings.neurips.cc
… Byzantine voters trying to deteriorate the ranking. We consider a stronglyadversarial scenario
where the Byzantine voters know the BTL scores, the votes … all Byzantine voters voting the …
where the Byzantine voters know the BTL scores, the votes … all Byzantine voters voting the …
Communication complexity of byzantine agreement, revisited
As Byzantine Agreement (BA) protocols find application in large-scale decentralized
cryptocurrencies, an increasingly important problem is to design BA protocols with improved …
cryptocurrencies, an increasingly important problem is to design BA protocols with improved …
One Person One Vote: Achieving Temporal Dynamic and Byzantine-Resilient Digital Community
P Zhao, Y Mu, G Zhang - IEEE Transactions on Computational …, 2024 - ieeexplore.ieee.org
… digital communities is threatened by Byzantines therein. Most existing works focused on
Byzantine detection, but we are interested in growing Byzantineresilient community rather than …
Byzantine detection, but we are interested in growing Byzantineresilient community rather than …
Quadratic voting and blockchain governance
D Wright Jr - UMKC L. Rev., 2019 - HeinOnline
… rationing voting in traditional one-person, one-vote mechanisms (" … voters can express their
preference by acquiring extra votes. To link the number of votes and the intensity of QV voters…
preference by acquiring extra votes. To link the number of votes and the intensity of QV voters…
Random oracles in constantipole: practical asynchronous byzantine agreement using cryptography
… Taken together, we obtain a new protocol for Byzantine agreement that is … vote expresses
Pi's preference for b based on evidence for preference b in round r - 1, whereas a soft pre-vote …
Pi's preference for b based on evidence for preference b in round r - 1, whereas a soft pre-vote …
Blockchain proportional governance reconfiguration: Mitigating a governance oligarchy
D Tennakoon, V Gramoli - 2023 IEEE/ACM 23rd International …, 2023 - ieeexplore.ieee.org
… of Byzantine voters). As it is impossible to distinguish a non-responsive Byzantine voter from
a … ID Hill, “To advance the understanding of preferential voting system - notes on the droop …
a … ID Hill, “To advance the understanding of preferential voting system - notes on the droop …
Byzantine Agreement on Representative Input Values Over Public Channels
D Melnyk - 2020 - research-collection.ethz.ch
… to be preference rankings of three or more candidates. This so-called preferential voting
raises … At first, a deterministic algorithm to solve Byzantine agreement on rankings is proposed …
raises … At first, a deterministic algorithm to solve Byzantine agreement on rankings is proposed …
Distributed, end-to-end verifiable, and privacy-preserving internet voting systems
… We consider arbitrary (Byzantine) failures, because we expect our system to be deployed
across separate administrative domains. For each of the subsystems, we have the following …
across separate administrative domains. For each of the subsystems, we have the following …